Monday, January 19, 2009

Workshop on Information Credibility

After the discussions of trust and the internet I posted last night, this workshop announcement showed up in my inbox today.

Third Workshop on Information Credibility on the Web (WICOW 2009)

Workshop description: (from the website)
"As computers and computer networks become more common, a huge amount of information, such as that found in Web documents, has been accumulated and circulated. Such information gives many people a framework for organizing their private and professional lives. However, in general, the quality control of Web content is insufficient due to low publishing barriers. In result there is a lot of mistaken or unreliable information on the Web that can have detrimental effects on users. This situation calls for technology that would facilitate judging the trustworthiness of content and the quality and accuracy of the information that users encounter on the Web."

The conference will be held in Madrid, Spain on April 20, 2009.

Conference website: http://www.dl.kuis.kyoto-u.ac.jp/wicow3/

What is a social network system (SNS)? (Act two)

Second Act

Social networking sites can be analyzed using several methodologies: sociology, ethnography, by using communication models, using political models and through the lens of violence. What enables the multitude of analyses is the fact that users of these virtual spaces conceptualize them as real spaces, and each user brings with them social norms and behaviors to be incorporated into the virtual environment. These norms include concepts of civility, identity, and body (or self). Identity, body and civilization can all be injured in virtual environments through encounters with liars - those who mask their true virtual identity (such as with viral videos and blogs). Users of the online communities are offended by these encounters because in order to interact with a community online you have to be able to trust in it. The user is essentially participating in a willing suspension of disbelief, but must be able to trust the other performers in order to participate fully in the community. What happens when a community fails to trust? Either the community disintegrates, such as with Friendster, or the community rallies and defines itself, as with Dibbell’s MUD experience.

Trust is a critical issue of social networks. Keen highlights this point in his discussion of anonymity versus known authorship. While Keen argues that the validity of a source is inherently tied into the identity of the author - his social background, ethnicity, income level, etc. (he’s a bit of an elitist)- perhaps some proponents of social networks would argue that knowledge is the only true commodity of social networks and that a user who proves a reliable source of knowledge is valued regardless of identity or anonymity. Further, boyd and Ellis’s research confirms that users of social networks who adopt alternate identities (either as a family pet, a celebrity, or as an iconic character) are not shunned by social networking communities, but are rather embraced by them.

Yet how do libraries and librarians fit into these discussions? A clear connection between librarians and Keen, as Tenopir highlights, is the quest for truth and trustworthy sources. Social networking provides librarians and libraries a unique opportunity to branch out into various communities and to create these trustworthy source networks.

There is another aspect of this discussion which the various articles didn't necessarily touch upon, and that is the argument about education, learning experiences and library-sponsored access. SNSs provide a valuable opportunity for individuals to learn inter- and intrapersonal communication skills. Further, SSNs encourage new pathways of communication. It has also been pointed out that social networks are ideal for allowing teens to invest in a project which they build themselves, a critical element of Vygotsky's pedagogy. (For more information on this, see the YALSA Toolkit for Teens and Social Networking in School and Public Libraries) What all of this means is that librarians and educators can work together to ensure that teens have safe access to SNSs within the library so that they can learn various communication skills. The development of these skills is so vauable that boyd and Ellison (2007) point out that librarians have been fighting to retain access to SNSs for their teen patrons, even in the face of concerns about sexual and criminal predation.

Sunday, January 18, 2009

What is a social network system (SNS)? (Act One)

First Act


Definition and Introduction

boyd and Ellison (2007) define a social network as a a web-based service which allows individuals to construct a public or semi-public profile with a list of connections to other users. This list of connections is vital to social networks as it allows other users to view and traverse the connections between users. Social networks reflect real life social relationships, rather than purely online relationships. (boyd and Ellison, 2007) SNSs, then, vary critically from other forms of internet communication such as MUD’s, which are virtual environments that reflect a group of strangers gathering around a common interest rather than a social connection. (Dibbell, 1998) Additionally, boyd and Ellison’s rather dry and un-engaging article provides an excellent summary of several issues related to social networks. These include (in progressively philosophical order) the visibility of social networks, the evolution of computer mediated communication (CMC), criminal / sexual predation, trust, identity and the role of libraries and librarians within the various debates.

Viewing the Invisible

There is a tension within social networking: the need to be seen versus the need to be private. It is a complicated tension, because not only is there a tension between indexing a social network and retaining member privacy, there is a tension between the information that the individual user publishes for mass consumption, and what they retain as private. boyd and Ellison (2007), Nardi, Schiano and Gumbrecht (2004), and Herring et al (2004), all touch upon this issue in different ways. Perhaps the most in-depth analysis is composed by Nardi, Schiano and Gumbrecht, who found that the majority of bloggers (within their study) publish personal entries for mass consumption, fully aware that they have an audience, with only a casual concern for the security of their information. The bloggers studied revealed there is some degree of ambivalence present in social networks. The bloggers are posting information with the idea that “I’m posting this for others to see, but I’m not expecting strangers to read it - why would they be interested in me?” But at the same time, these bloggers are posting critical information about themselves “I’m going to Boston for the next three weeks” means that an opportunistic robber now knows that they have three weeks to locate this persons’ apartment and determine if anyone is checking in on the place. However, bloggers want to trust their audiences, so they persist in these behaviors. (More on trust below)

Communication lines

Describing this subsection was tricky. “Communication without voice” is no longer applicable because of networks such as Skype and Second Life. “Communication without body” is also inaccurate because of the implementation of avatars in several platforms. This is a far cry from the plain text which the internet was limited to until the mid-90’s. One thing which social networks reveal to us is the evolution of CMC. At the text level we see the implementation of chat rooms and MUDs. With the capability of photography we see the development of sites such as flickr, and the incorporation of photographs into text-dominated networks such as blogs. The ability to upload videos leads to new communication pathways and the development of sites such as youtube. Blogs have the additional flexibility of incorporating sound, video and photographs into text. Beyond the mere incorporation of real life communication pathways, we see the creation of new methods of communication. For example, I included a video for readers to review before beginning reading - something which would not be socially acceptable in everyday conversation, but which is completely permissible within the context of a social network.

Lions, tigers and sexual predators, oh my!

An interesting transition can be observed through reading these articles. As the articles become increasingly current the threat of sexual and criminal predation becomes more apparent, and the need to protect the individual and their privacy becomes an increasingly pressing issue. It’s almost like watching an extremely fast-forwarded version of the Web from 1990-1997. Aww, the good old days, when you could use your social security number as an identifier....

Trust and truth

What can you trust on the internet? Who can you trust? What can you trust in your inbox? Here’s an example:

Reusing plastic bottles is bad because this reuse causes them to break down over time and release carcinogens.

Several major brands of lipstick contain dangerous levels of lead.

Microwaving foods in plastic containers releases carcinogens into the food.

Mold that grows in pancake mix can induce a life-threatening allergic reaction.

Some Chinese hair bands were fashioned from recycled condoms.

All of these stories were transmitted via email, but only one of them is true. If you received any of them in your inbox, would you be able to tell fact from fiction? Who would you ask? A friend, maybe even a family member, sent this important safety message to you, but should you trust their analysis? The correct response is “No, I don’t trust my crazed sister who sends me fifteen emails a day about pets, lucky totems, and toxin threats. I’m going to hold off forwarding this to all of my friends and check Snopes.com first.”

Trust is an interesting concept within social networks. It is intimately tied to authority. Andrew Keen argues that anonymous authorship is equivalent with cultural illiteracy. In his opinion, the information cannot be trusted because the reader cannot contextualize the material. This is an interesting opinion, because anonymity has long been the vehicle of choice for authors of contentious works. It’s my understanding that these authors choose to publish anonymously because this gives freedom of expression and a true sense of clearing out the baggage and just listening to and evaluating the words and the information itself. I seem to recall a couple of Enlightenment philosophers making that argument, but I can’t call to mind specific examples. At any rate, whether or not you agree with Keen, and I think my position is clear, he does make an important point: how do we know what is true and what is false in an increasingly self-published world? The answer is the same as it’s always been when confronted with new arguments or information: the reader has to check up on the facts. They have to evaluate them, they have to be able to fall back on reliable sources to make their judgements.

Trust goes beyond source authority, though, and incorporates other practical and philosophical considerations. Users have to be able to trust their social network. We see this within Dibbell’s description of a MUD environment. The users place trust in their characters, and within the characters of others. They put trust into the database itself which generates descriptions of the locations they are in. In this extreme case, the community itself needed to be able to trust the system administrators to enforce a system or code of justice and order. Trust is an integral part of the social network, it is what allows the users to post and to interact. boyd and Ellis describe the downfall of Friendster, and this can be viewed as the failure of a community to trust in the integrity and security of a social network, and their failure to trust the administrators of that network.

Anthropomorphism and other generated identities

If we don’t know an individuals’ name, but only their nickname, can we trust that individual? The power of a name has been documented throughout history. Names imbue meaning, they lend power, they define us. Does it matter then, if we name ourselves something else? Here is where trust begins to overlap with identity. In a world without physical bodies and devoid of voice, we are able to redefine how we identify ourselves. A clear example of this is presented by Dibbell, who admits to occasionally being a dolphin. Additional examples of revised identities include dogster and catster, which allow pet owners to assume the identity of their pet within the context of an online social network, and “fakester” profiles, the corruption of a celebrity, fictional character or concept as an identity. (boyd and Ellison, 2007)

The advent of the internet allowed us to ask ourselves “Who am I?”, but the advent of the social network has allowed us to ask ourselves “Who am I connected to?” How does the individual within the social network define their identity through their social circle? Who do they choose to include, and who do they choose to exclude? While it may not be possible to divest yourself of a troublesome sibling or ex-partner in real life, it is possible to divest yourself of them in a virtual space.

Tuesday, January 13, 2009

Conceptions of social computing: an analysis in three acts

Prelude


Check out Common Craft’s video “Social Networks in Plain English” for an entertaining explanation of what a social network is. These guys make me happy.